首页> 外文会议>Convention of Computer Society of India >Comprehensive Methodology for Threat Identification and Vulnerability Assessment in Ad hoc Networks
【24h】

Comprehensive Methodology for Threat Identification and Vulnerability Assessment in Ad hoc Networks

机译:临时网络威胁识别和脆弱性评估的综合方法

获取原文

摘要

Ad hoc networks are self-configuring wireless networks without any centralized management. These days, such networks are useful in military application owing to the ease of deployment. The inherent characteristics of these networks introduce new security threats and vulnerabilities that lead to more security attacks as compared to wired and wireless infrastructure networks. For threat identification, a hybrid threat identification methodology is proposed which combines the "Asset centric and Attacker centric" approaches. It takes into account the critical assets present in the network and the adversary capability required for compromising these assets. Further, a vulnerability assessment methodology is proposed under which the network vulnerabilities are analyzed at different levels-Host, Routing Protocol, Node Behavior, and Crypto Algorithms. The proposed methodology has been examined using two different types of scenario-emulated network and real network.
机译:ad hoc网络是自配置的无线网络,没有任何集中管理。这些天,由于部署的易于部署,这种网络在军事应用中有用。这些网络的固有特性引入了新的安全威胁和漏洞,与有线和无线基础设施网络相比,导致更多的安全攻击。对于威胁识别,提出了一种混合威胁识别方法,其结合了“资产中心和以中心”方法。它考虑了网络中存在的关键资产以及损害这些资产所需的对手能力。此外,提出了一种漏洞评估方法,在其中在不同的级别 - 主机,路由协议,节点行为和加密算法中分析了网络漏洞。已经使用两种不同类型的情景 - 模拟网络和真实网络进行了拟议的方法。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号